CFP last date
20 December 2024
Reseach Article

Sybil Attack and its Proposed Solution

by Hardik Jhaveri, Harshit Jhaveri, Dhaval Sanghavi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 105 - Number 3
Year of Publication: 2014
Authors: Hardik Jhaveri, Harshit Jhaveri, Dhaval Sanghavi
10.5120/18357-9488

Hardik Jhaveri, Harshit Jhaveri, Dhaval Sanghavi . Sybil Attack and its Proposed Solution. International Journal of Computer Applications. 105, 3 ( November 2014), 17-19. DOI=10.5120/18357-9488

@article{ 10.5120/18357-9488,
author = { Hardik Jhaveri, Harshit Jhaveri, Dhaval Sanghavi },
title = { Sybil Attack and its Proposed Solution },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 105 },
number = { 3 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 17-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume105/number3/18357-9488/ },
doi = { 10.5120/18357-9488 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:36:44.055861+05:30
%A Hardik Jhaveri
%A Harshit Jhaveri
%A Dhaval Sanghavi
%T Sybil Attack and its Proposed Solution
%J International Journal of Computer Applications
%@ 0975-8887
%V 105
%N 3
%P 17-19
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Social engineering, in terms of information security, refers to manipulation of people into performing actions or divulging information. A type of trick for the purpose of gathering of information, fraud, or system access, it differs from a traditional "con. "Social engineering" is define as an act of psychological manipulation which is also associated with the social sciences, but its usage has caught computer and information security professionals.

References
  1. H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman, "Sybilguard: defending against sybil attacks via social networks," in Proc. of ACM SIGCOMM, vol. 36, no. 4, 2006, pp. 267–278.
  2. H. Yu, "Sybil defenses via social networks: a tutorial and survey," SIGACT News, vol. 42, no. 3, pp. 80–101, 2011.
  3. B. Viswanath, A. Post, K. Gummadi, and A. Mislove, "An analysis of social network-based sybil defenses," in Proc. of ACM SIGCOMM, vol. 40, no. 4, 2010, pp. 363–374.
  4. X. Zheng, Y. Lai, K. Chow, L. Hui, and S. Yiu, "Sockpuppet detection in online discussion forums," in Proc. of IEEE IIH-MSP, 2011, pp. 374–377.
  5. L. Page, S. Brin, R. Motwani, and T. Winograd, "The PageRank citation ranking: bringing order to the web," Technical report, Stanford University, 1999.
  6. J. Golbeck, B. Parsia, and J. Hendler, "Trust networks on the semantic web," Cooperative Information Agents VII, pp. 238–249, 2003
  7. J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis & defenses," in Proc. of ACM IPSN, 2004, pp. 259–268.
Index Terms

Computer Science
Information Sciences

Keywords

Reverse Social Engineering Sybil Attack Social Engineering